Total
131 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2022-41211 | 1 Sap | 2 3d Visual Enterprise Author, 3d Visual Enterprise Viewer | 2022-12-08 | N/A | 7.8 HIGH |
Due to lack of proper memory management, when a victim opens manipulated file received from untrusted sources in SAP 3D Visual Enterprise Author and SAP 3D Visual Enterprise Viewer, Arbitrary Code Execution can be triggered when payload forces:Re-use of dangling pointer which refers to overwritten space in memory. The accessed memory must be filled with code to execute the attack. Therefore, repeated success is unlikely.Stack-based buffer overflow. Since the memory overwritten is random, based on access rights of the memory, repeated success is not assured. | |||||
CVE-2022-22538 | 1 Sap | 1 3d Visual Enterprise Viewer | 2022-10-26 | 4.3 MEDIUM | 6.5 MEDIUM |
When a user opens a manipulated Adobe Illustrator file format (.ai, ai.x3d) received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9.0, the application crashes and becomes temporarily unavailable to the user until restart of the application. The file format details along with their CVE relevant information can be found below. | |||||
CVE-2022-22537 | 1 Sap | 1 3d Visual Enterprise Viewer | 2022-10-26 | 4.3 MEDIUM | 6.5 MEDIUM |
When a user opens a manipulated Tagged Image File Format (.tiff, 2d.x3d)) received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9.0, the application crashes and becomes temporarily unavailable to the user until restart of the application. The file format details along with their CVE relevant information can be found below. | |||||
CVE-2022-22539 | 1 Sap | 1 3d Visual Enterprise Viewer | 2022-10-26 | 4.3 MEDIUM | 6.5 MEDIUM |
When a user opens a manipulated JPEG file format (.jpg, 2d.x3d) received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9.0, the application crashes and becomes temporarily unavailable to the user until restart of the application. The file format details along with their CVE relevant information can be found below. | |||||
CVE-2022-32239 | 1 Sap | 1 3d Visual Enterprise Viewer | 2022-10-19 | 4.3 MEDIUM | 5.5 MEDIUM |
When a user opens manipulated JPEG 2000 (.jp2, jp2k.x3d) files received from untrusted sources in SAP 3D Visual Enterprise Viewer, the application crashes and becomes temporarily unavailable to the user until restart of the application. | |||||
CVE-2022-41192 | 1 Sap | 1 3d Visual Enterprise Viewer | 2022-10-12 | N/A | 7.8 HIGH |
Due to lack of proper memory management, when a victim opens manipulated Jupiter Tesselation (.jt, JTReader.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application. | |||||
CVE-2022-41187 | 1 Sap | 1 3d Visual Enterprise Viewer | 2022-10-12 | N/A | 7.8 HIGH |
Due to lack of proper memory management, when a victim opens a manipulated Wavefront Object (.obj, ObjTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. | |||||
CVE-2022-41188 | 1 Sap | 1 3d Visual Enterprise Viewer | 2022-10-12 | N/A | 7.8 HIGH |
Due to lack of proper memory management, when a victim opens manipulated Wavefront Object (.obj, ObjTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application. | |||||
CVE-2022-41191 | 1 Sap | 1 3d Visual Enterprise Viewer | 2022-10-12 | N/A | 7.8 HIGH |
Due to lack of proper memory management, when a victim opens a manipulated Jupiter Tesselation (.jt, JTReader.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. | |||||
CVE-2022-41190 | 1 Sap | 1 3d Visual Enterprise Viewer | 2022-10-12 | N/A | 7.8 HIGH |
Due to lack of proper memory management, when a victim opens a manipulated AutoCAD (.dxf, TeighaTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. | |||||
CVE-2022-41189 | 1 Sap | 1 3d Visual Enterprise Viewer | 2022-10-12 | N/A | 7.8 HIGH |
Due to lack of proper memory management, when a victim opens a manipulated AutoCAD (.dwg, TeighaTranslator.exe) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. | |||||
CVE-2022-41199 | 1 Sap | 1 3d Visual Enterprise Viewer | 2022-10-12 | N/A | 7.8 HIGH |
Due to lack of proper memory management, when a victim opens a manipulated Open Inventor File (.iv, vrml.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. | |||||
CVE-2022-41194 | 1 Sap | 1 3d Visual Enterprise Viewer | 2022-10-12 | N/A | 7.8 HIGH |
Due to lack of proper memory management, when a victim opens a manipulated Encapsulated Postscript (.eps, ai.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application. | |||||
CVE-2022-41195 | 1 Sap | 1 3d Visual Enterprise Viewer | 2022-10-12 | N/A | 7.8 HIGH |
Due to lack of proper memory management, when a victim opens a manipulated EAAmiga Interchange File Format (.iff, 2d.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. | |||||
CVE-2022-41198 | 1 Sap | 1 3d Visual Enterprise Viewer | 2022-10-12 | N/A | 7.8 HIGH |
Due to lack of proper memory management, when a victim opens a manipulated SketchUp (.skp, SketchUp.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. | |||||
CVE-2022-41197 | 1 Sap | 1 3d Visual Enterprise Viewer | 2022-10-12 | N/A | 7.8 HIGH |
Due to lack of proper memory management, when a victim opens a manipulated VRML Worlds (.wrl, vrml.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible for the application to crash and becomes temporarily unavailable to the user until restart of the application. | |||||
CVE-2022-41196 | 1 Sap | 1 3d Visual Enterprise Viewer | 2022-10-12 | N/A | 7.8 HIGH |
Due to lack of proper memory management, when a victim opens a manipulated VRML Worlds (.wrl, vrml.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. | |||||
CVE-2022-41200 | 1 Sap | 1 3d Visual Enterprise Viewer | 2022-10-12 | N/A | 7.8 HIGH |
Due to lack of proper memory management, when a victim opens a manipulated Scalable Vector Graphic (.svg, svg.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. | |||||
CVE-2022-41201 | 1 Sap | 1 3d Visual Enterprise Viewer | 2022-10-12 | N/A | 7.8 HIGH |
Due to lack of proper memory management, when a victim opens a manipulated Right Hemisphere Binary (.rh, rh.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. | |||||
CVE-2022-41193 | 1 Sap | 1 3d Visual Enterprise Viewer | 2022-10-12 | N/A | 7.8 HIGH |
Due to lack of proper memory management, when a victim opens a manipulated Encapsulated Post Script (.eps, ai.x3d) file received from untrusted sources in SAP 3D Visual Enterprise Viewer - version 9, it is possible that a Remote Code Execution can be triggered when payload forces a stack-based overflow or a re-use of dangling pointer which refers to overwritten space in memory. |